-
4 May 2018Data hacked during EPFO-Aadhar seedingCyber criminals seem to have hacked the EPFO data which holds information like name, Aadhar card number, bank...
-
25 April 2018Smartly defining RPO and RTO for Disaster Recovery PlansRecovery Point Objective (RPO) and Recovery Time Objective (RTO) are 2 most important parameters for a disaster recovery...
-
25 April 2018Formbook Malware spreading widely by clicking Microsoft URL shortcut files in your emailsBe careful when you receive attachments to an email, it can be an entry point to Formbook Malware....
-
25 April 2018CIOs must run a customer centric businessIt is high time for CIOs to run a customer centric business. In today’s world, where there are...
-
20 April 2018Indian Government needs to give cyber security an equal priority to border securityDigital India is no more a dream but carving into an absolute reality. The steps taken by the...
-
19 April 2018Rarog – A cryptomining Trojan is out in the wildA malware family Rarog is out in the internet and being excessively used by the cyber criminals to...
-
17 April 2018Private Cloud vs Public Cloud. Making the perfect choice!Embracing cloud technology is no longer a choice but an inevitable business move. However migrating to cloud is...
-
16 April 2018Slingshot, an APT Malware making its way through routers in the NetworkAn APT (Advanced Persistent Threat) malware, Slingshot, attacks victims by entering via routers and gaining kernel access to...
-
14 April 2018Microsoft Office 365 provides new Advanced Security FeaturesMicrosoft Office 365 is widely popular work office suite, among the SMBs. Hence, no doubt that it has...
-
12 April 2018Is blockchain the alchemy to DDoS attacks?DDoS(Denial of Distributed Service) attack is a type of cyber attack that involves a large number of computers...
Data hacked during EPFO-Aadhar seeding
04 May 2018